First published: Wed May 04 2022(Updated: )
A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, local attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system restrictions. An authenticated attacker with netadmin privileges could exploit this vulnerability by accessing the vshell of an affected system. A successful exploit could allow the attacker to read sensitive information on the underlying operating system.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager | >=20.6<20.6.3 | |
Cisco Catalyst SD-WAN Manager | >=20.7<20.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20734 is a vulnerability in Cisco SD-WAN vManage Software that could allow an authenticated local attacker to view sensitive information on an affected system.
The severity of CVE-2022-20734 is medium with a CVSS score of 4.4.
CVE-2022-20734 occurs due to insufficient file system restrictions in Cisco SD-WAN vManage Software.
An authenticated attacker with netadmin privileges can exploit CVE-2022-20734.
To mitigate CVE-2022-20734, update Cisco SD-WAN vManage Software to version 20.7.3 or later as recommended by Cisco.